IT Management  >   Systems Operations  >   Security  >  

Managing IT Security

RSS Feed    Add to Google    Add to My Yahoo!
Managing IT Security Reports
 
Application Whitelisting: Discover the Pros and Cons
sponsored by Threat Track Security
WHITE PAPER: This webpage explores the option of whitelisting, dissecting its pros and cons.
Posted: 18 Feb 2015 | Published: 04 Nov 2013

Threat Track Security

Enhance Your Malware Protection
sponsored by IBM
WHITE PAPER: This white paper describes a malware protection that can accurately identify even the most advanced malware.
Posted: 06 Mar 2015 | Published: 31 Aug 2014

IBM

Profiling an Enigma: The Mystery of North Korea’s Cyber Threat Landscape
sponsored by Hewlett-Packard Company
WHITE PAPER: This highly interesting resource delves into North Korea's cyber threat landscape, deeply analyzing what is known about the regime's capabilities and motives, which are largely shrouded in secrecy.
Posted: 05 Feb 2015 | Published: 29 Aug 2014

Hewlett-Packard Company

A Clear View into User Activities with Identity Intelligence
sponsored by IBM
WHITE PAPER: Access this white paper to learn about an identity intelligence platform that can help better manage and secure users as a key line of defense across infrastructure perimeters.  Additionally, view now to read several case stories of organizations who have had success with this identity intelligence platform.
Posted: 25 Feb 2015 | Published: 17 Sep 2014

IBM

Insider Strategies for Application Layer Security
sponsored by Veracode, Inc.
WEBCAST: Join in this webcast to learn how a testing strategy can secure all of your apps and how one cloud-based service can help.
Posted: 27 Feb 2015 | Premiered: Feb 25, 2015

Veracode, Inc.

Huge Healthcare Data Breaches: How to Halt the Hacking Proactively
sponsored by Certes Networks
VIDEO: This short video introduces a potential safeguard for sensitive healthcare data being used in network applications: A secure virtual overlay of data traffic that follows users regardless of the devices they use or the networks they access.
Posted: 12 Feb 2015 | Premiered: 12 Feb 2015

Certes Networks

SIEM Battleground Unfolds Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This classroom looks at next-generation security information and event management (SIEM), analytic tools and cloud-based systems designed to help CISOs make sense of security data.
Posted: 05 Mar 2015 | Premieres: 16 Mar 2015

SearchSecurity.com

Critical Security Controls: From Adoption to Implementation
sponsored by Qualys
WHITE PAPER: This white paper reveals the results of a survey on CSC implementation, including the barriers businesses face and suggestions for overcoming them.
Posted: 04 Feb 2015 | Published: 30 Sep 2014

Qualys

Case Study: App Code Security from the Ground Up
sponsored by Veracode, Inc.
WEBCAST: View this webcast and explore how one major airline secured 300 third-party aps by building security from the code up. Discover the steps they took to close security gaps in the code and how to apply the strategies to your apps.
Posted: 02 Mar 2015 | Premiered: Jul 7, 2014

Veracode, Inc.

Cloud Model Enhances DNS Security
sponsored by Efficientip
WHITE PAPER: This white paper suggests one way to prevent DNS compromises – a hybrid cloud DNS server.
Posted: 05 Mar 2015 | Published: 31 Dec 2014

Efficientip
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement